Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
Posted: 28 Nov 2022 | Published: 29 Nov 2022
|
|
|
Computer Weekly – 25 August 2020: When algorithms don't play fair
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we report on the auditing of algorithms to countervail bias. We examine what CISOs can learn from Covid-19. And we assess how competent AI is at building applications that deliver the best possible customer experience, in our buyer's guide to modern software development. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Aug 2020
|
|
|
Computer Weekly - 10 September 2024: The flight to data success
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at how Manchester Airport Group has set course to become the world's most intelligent airport through its data-led approach. We also look at failings of AI initiatives as the tech hits roadblocks, as well as take a peak at what support networks are available to those new in the CISO role. Read the issue now.
Posted: 09 Sep 2024 | Published: 10 Sep 2024
|
|
|
The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021
|
|
|
CISO Success Stories: How security leaders are tackling evolving cyber threats
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.
Posted: 18 Jan 2024 | Published: 19 Jan 2024
|
|
|
Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee
sponsored by Information Security Magazine
EZINE:
This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.
Posted: 07 May 2009 | Published: 01 Jan 2009
|
|
|
2023 IT Salary & Career Survey
sponsored by TechTarget ComputerWeekly.com
LANDING PAGE:
Our IT Salary & Career Study is now underway and we need your help to determine the current trends in employment & salaries. As a valued Computer Weekly member, you're invited to share your experience by completing this survey. It only takes a few minutes to complete and you'll also be one of the first to receive a detailed survey report.
Posted: 23 Feb 2023 | Published: 24 Feb 2023
|
|
|
Computer Weekly – 11 February 2025: A two-horse race? Competition concerns cloud AWS and Microsoft
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, Microsoft and AWS don't like it, but the UK competition watchdog says their hold on the cloud market is cause for concern. We talk to AutoTrader's CEO about how to become a digital business. And we go behind the scenes at Zoom to see how AI will revolutionise the former lockdown success story. Read the issue now.
Posted: 10 Feb 2025 | Published: 11 Feb 2025
|
|
|
CW EMEA - June 2023: IT budgets buck trend
sponsored by TechTarget ComputerWeekly.com
EZINE:
Despite gloomy economic conditions worldwide, IT leaders in EMEA expect budgets to increase this year, according to TechTarget/Computer Weekly's IT Priorities survey. We also look at how health authorities in the UAE are modernising healthcare services, how Finland and Estonia are sharing expertise, and how the Dutch government is addressing bias.
Posted: 08 Jun 2023 | Published: 08 Jun 2023
|
|
|
CISO Perspectives for 2025
sponsored by Portnox
RESEARCH CONTENT:
CISOs are concerned about security breaches and their job security, as they balance security with employee experience. Many are implementing Passwordless Authentication to improve access control, but face challenges like employee resistance. Download the full report to explore CISO perspectives on Zero Trust, MFA, regulations, and cyber insurance.
Posted: 08 Feb 2025 | Published: 08 Feb 2025
|
|
|
The CISO Survival Guide
sponsored by ReversingLabs
EBOOK:
The rise of software supply chain attacks targeting third-party software providers and rising regulatory pressure has spurred cybersecurity and risk leaders to pay special attention to commercial software and the gaps it presents across the software supply chain. Read this 18-page guide for risk management guidance.
Posted: 23 Jan 2025 | Published: 24 Jan 2025
|
|
|
CISO Report Emerging trends
sponsored by Splunk
EBOOK:
CISOs and their boards are working more closely than ever. But their backgrounds are worlds apart, leading to gaps in priorities, goals, and success metrics. Learn how CISOs and boards can bridge the divide and build stronger, more productive relationships.
Posted: 20 Feb 2025 | Published: 20 Feb 2025
|
|
|
The Industrial CISO: Bringing Balance
sponsored by Netskope
EBOOK:
This report explores the evolving role of CISOs in the industrial sector, revealing their growing confidence as business enablers despite perception challenges from C-suite peers. It examines the adoption of zero trust principles and the need for CISOs to focus on business enablement over technology. Read the full eBook for deeper insights.
Posted: 27 Feb 2025 | Published: 28 Feb 2025
|
|
|
The CISO Guide to Ransomware Prevention
sponsored by Checkpoint Software Technologies
WHITE PAPER:
Over the last 5 years, ransomware attacks have increased by 13%, with the average cost exceeding $1.8 million per incident. This white paper presents a CISO’s guide to ransomware prevention, including insights from Check Point VP Security Engineering, Jeff Schwartz. Read on to learn more.
Posted: 10 May 2024 | Published: 10 May 2024
|
|
|
A CISO's Guide to AI in 2024
sponsored by Checkpoint Software Technologies
EBOOK:
While generative AI has garnered much attention, it only represents a fragment of the rapidly evolving AI landscape. Security teams have recognized the potential AI has to transform cybersecurity, highlighted by the 92% of organizations that intend to use AI and machine learning to support cyber security. Download this e-book to learn more.
Posted: 15 May 2024 | Published: 15 May 2024
|
|
|
From The Trenches: A CISO's Guide To Threat Intelligence
sponsored by Zscaler
BLOG:
Threat intelligence gives CISOs critical insights to proactively defend against evolving cyber threats. This guide explores how to build an effective threat intelligence program, leverage standardized sharing formats, and transform security from reactive to proactive. Read the full article to learn more.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
The Ciso’s Guide To The Roi Of Cybersecurity
sponsored by Arkose Labs
EBOOK:
Facing increased scrutiny and cyberthreats, CISOs can explore 5 ways to show bot management ROI in this e-book. Learn to quantify savings from less downtime, breaches, reputational harm, and revenue loss. Download to justify investing in modern bot management.
Posted: 16 Jul 2024 | Published: 16 Jul 2024
|
|
|
CISO’s AI Journey Checklist
sponsored by CBTS
INFOGRAPHIC:
This infographic provides a guide for CISOs on securely integrating AI into their organizations. It covers critical steps such as assessing AI risks, understanding data requirements, approving AI services, and fostering a culture of ethical AI use. Download the infographic to learn how to strengthen your organization's cybersecurity with AI.
Posted: 27 Jan 2025 | Published: 28 Jan 2025
|
|
|
5 Security Concerns for CISOs and How to Address Them
sponsored by Palo Alto Networks
WHITE PAPER:
This white paper explores 5 key security concerns for CISOs, including supply chain attacks, cloud security, and overloaded security teams. Get expert guidance on how to address these issues and prepare your organization for evolving cyberthreats. Read the full white paper to learn more.
Posted: 08 Nov 2024 | Published: 08 Nov 2024
|
|
|
Getting Cloud Security Right
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.
Posted: 08 Feb 2021 | Published: 11 May 2020
|
|
|
A CISO's Guide to Cyber Security in Action (2023)
sponsored by Checkpoint Software Technologies
WHITE PAPER:
Emerging threats are forcing security teams to evolve by adopting and adapting new technologies, putting tremendous pressure on CISOs. This white paper presents a guide to help CISOs navigate the challenges of today’s security landscape. Read on to learn more.
Posted: 17 May 2024 | Published: 17 May 2024
|
|
|
Untethered: How CIOs & CISOs Are Paving the Way for the New Hybrid Workforce
sponsored by Zscaler
RESEARCH CONTENT:
This in-depth research report examines how CIOs and CISOs are overcoming the challenges of the hybrid workforce, including securing remote access and more. Download the full report to discover effective techniques for transitioning to a Zero Trust strategy.
Posted: 13 Aug 2024 | Published: 20 Aug 2024
|
|
|
A CISO’s Guide to Rethinking Insider Risk
sponsored by Exabeam
WHITE PAPER:
Insider threats account for 68% of data breaches, with negligent employees causing 55% of incidents, costing $7.2 million on average. This white paper shows how CISOs should work with HR, Legal, and Security teams to detect and prevent insider risks using frameworks, strategies, and automated detection. Read for a comprehensive risk plan.
Posted: 26 Mar 2025 | Published: 26 Mar 2025
|
|
|
Fraud & Threat Prevention A Checklist for CIOs & CISOs
sponsored by Ping Identity Corporation
WHITE PAPER:
This checklist for CIOs and CISOs outlines key identity and access management capabilities to prevent fraud and insider threats. It covers customer identity, workforce identity, and B2B access, offering strategies to boost security, compliance, and user satisfaction. Read this paper to assess your organization's fraud readiness and security.
Posted: 15 Mar 2025 | Published: 15 Mar 2025
|
|
|
A CISO's Guide to the AI Opportunity in Security Operations
sponsored by Exabeam
WHITE PAPER:
AI is transforming cybersecurity, impacting both attackers and defenders. This guide examines AI's role in enhancing threat detection via machine learning and the challenges it poses, like advanced phishing and polymorphic malware. Discover how to assess AI solutions for your SOC and prepare for an AI-driven security future by reading the paper.
Posted: 22 Mar 2025 | Published: 20 Mar 2025
|
|
|
A CISO’s Guide to the AI Opportunity in Security Operations
sponsored by Exabeam
WHITE PAPER:
AI is transforming cybersecurity, presenting opportunities and threats for CISOs. This guide defines AI technologies impacting security, explores their role in threat detection, and outlines building AI-augmented defenses. Discover proven technologies that strengthen security. Read the white paper to prepare your SOC for an AI-driven future.
Posted: 26 Mar 2025 | Published: 26 Mar 2025
|
|
|
The Cost of Compromise: Why CISOs Should Reject 'Good Enough' Security
sponsored by Exabeam
WHITE PAPER:
This white paper explains why CISOs should prioritize best-of-breed SIEM solutions over "good enough" enterprise platform security. Single-vendor approaches risk blind spots, single points of failure, and limited log ingestion—compromising security. Read to understand why specialized solutions offer superior threat detection and response.
Posted: 22 Mar 2025 | Published: 20 Mar 2025
|
|
|
A CISO’s Guide to the AI Opportunity in Security Operations
sponsored by Exabeam
WHITE PAPER:
AI is transforming cybersecurity, impacting both attackers and defenders. This guide examines AI's role in enhancing threat detection via machine learning and the challenges it poses, like advanced phishing and polymorphic malware. Discover how to assess AI solutions for your SOC and prepare for an AI-driven security future by reading the paper.
Posted: 20 Mar 2025 | Published: 20 Mar 2025
|
|
|
The Healthcare CISO’s Medical IoT Security Guide
sponsored by Palo Alto Networks
EBOOK:
Over the past few years, the healthcare industry has seen a surge in the use of connected medical devices. However, the more devices a healthcare organization deploys and connects, the bigger their attack surface becomes, putting confidential health data at risk. Read on to learn how to overcome the risk exposure of medical IoT devices.
Posted: 08 Nov 2023 | Published: 08 Nov 2023
|
|
|
Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Apr 2020
|
|
|
The Transformational CISO’s Guide to Security Orchestration, Automation and Response
sponsored by Splunk
EBOOK:
Download your complimentary copy of “The Transformational CISO’s Guide to Security Orchestration, Automation and Response (SOAR)” to learn the four qualities of a CISO executives value most, and how SOAR can help many of the biggest challenges facing CISOs.
Posted: 19 Aug 2022 | Published: 19 Aug 2022
|
|
|
30-60-90-Day CISO: Mastering the IT Security Game
sponsored by Cato Networks
EBOOK:
Whether you're a new CISO, aspiring to the role or simply looking for a refresher, this eBook spells out critical steps to master in your first 30-60-90 days on the job. Gain insights to secure your organization and build trust as a security leader. Read the full e-book to get started.
Posted: 12 Dec 2024 | Published: 13 Dec 2024
|
|